Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
188s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2022, 09:17
Static task
static1
Behavioral task
behavioral1
Sample
8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe
Resource
win7-20220812-en
General
-
Target
8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe
-
Size
818KB
-
MD5
73de66d2519ad200365714b17da81160
-
SHA1
f9ce9d8ec3c975ff27e074b75e6b76a6f1eda26b
-
SHA256
8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc
-
SHA512
9860b7d40649ceaf7ff442ce42ce0c92cb67f582a4dcac844a77865a06d732b4175b076d958ff5d72e00fec9e63351d32803f42160a00df5947ef83264d4e072
-
SSDEEP
12288:55sn5mnSeD0IpOB9yAARmRsCD7HXCiS4omMfNFS5VWjua+nrYaSbKYceukhy6Ipb:3sUnke49Ki0SN9yHFm+PFy
Malware Config
Extracted
cybergate
2.6
12345
neruel.no-ip.biz:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
service.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
12345
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\service.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\service.exe" vbc.exe -
Executes dropped EXE 1 IoCs
pid Process 824 service.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{66PLDK8J-68JN-27T2-1P7T-A3Q1DWXIP571} vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{66PLDK8J-68JN-27T2-1P7T-A3Q1DWXIP571}\StubPath = "C:\\Windows\\system32\\install\\service.exe Restart" vbc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{66PLDK8J-68JN-27T2-1P7T-A3Q1DWXIP571} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{66PLDK8J-68JN-27T2-1P7T-A3Q1DWXIP571}\StubPath = "C:\\Windows\\system32\\install\\service.exe" explorer.exe -
resource yara_rule behavioral2/memory/1096-134-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1096-136-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1096-137-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1096-138-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1096-141-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/3176-151-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/1096-148-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/3176-154-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/3960-161-0x00000000240F0000-0x0000000024152000-memory.dmp upx behavioral2/memory/1096-160-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1096-157-0x00000000240F0000-0x0000000024152000-memory.dmp upx behavioral2/memory/3960-162-0x00000000240F0000-0x0000000024152000-memory.dmp upx behavioral2/memory/3176-165-0x0000000031BA0000-0x0000000031BAD000-memory.dmp upx behavioral2/memory/3176-166-0x0000000031BA0000-0x0000000031BAD000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\service.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\service.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Temp1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe" WScript.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\service.exe vbc.exe File opened for modification C:\Windows\SysWOW64\install\service.exe vbc.exe File opened for modification C:\Windows\SysWOW64\install\service.exe explorer.exe File opened for modification C:\Windows\SysWOW64\install\ explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4444 set thread context of 1096 4444 8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings 8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4444 8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe 3960 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3960 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4444 8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe Token: SeDebugPrivilege 3960 explorer.exe Token: SeDebugPrivilege 3960 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1096 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4444 wrote to memory of 1096 4444 8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe 83 PID 4444 wrote to memory of 1096 4444 8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe 83 PID 4444 wrote to memory of 1096 4444 8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe 83 PID 4444 wrote to memory of 1096 4444 8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe 83 PID 4444 wrote to memory of 1096 4444 8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe 83 PID 4444 wrote to memory of 1096 4444 8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe 83 PID 4444 wrote to memory of 1096 4444 8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe 83 PID 4444 wrote to memory of 1096 4444 8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe 83 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 4444 wrote to memory of 1544 4444 8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe 85 PID 4444 wrote to memory of 1544 4444 8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe 85 PID 4444 wrote to memory of 1544 4444 8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe 85 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41 PID 1096 wrote to memory of 740 1096 vbc.exe 41
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:680
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:800
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:376
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:788
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:2400
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:1532
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe2⤵PID:4732
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4796
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4564
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3872
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3724
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3644
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3468
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3380
-
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding2⤵PID:3696
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:664
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:632
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:2396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:2732
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:2776
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s W32Time1⤵PID:2672
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:1764
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4696
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:4640
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:3148
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3196
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe"C:\Users\Admin\AppData\Local\Temp\8e8f3c6fe3e72dc430e1d5c4db110b420cbe9d62bfe7e68f82ad39795276e4dc.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
PID:3176
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3960 -
C:\Windows\SysWOW64\install\service.exe"C:\Windows\system32\install\service.exe"5⤵
- Executes dropped EXE
PID:824
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vbs_sbmff.VBS"3⤵
- Adds Run key to start application
PID:1544
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2716
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2700
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2692
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2680
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2604
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2452
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2408
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2372
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2180
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2120
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2060
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2020
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1988
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1936
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1916
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1824
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1800
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1700
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1680
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s FontCache1⤵PID:1672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1600
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1416
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1364
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1332
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1196
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1188
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1136
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1084
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1032
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:912
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:808
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2368
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1636
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 7165c6cd27f7aa93ee0acfec2e7aa937 4RLs7jQq7kWwttnzt4jL9Q.0.1.0.0.01⤵PID:392
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:3252
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:1424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:3236
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5c5e98105b61c6ffbfdefc2b97cb4c971
SHA178ffd1b328da9c103deaf5992f5f65736e1f0a43
SHA256e89a31920114d960dc2c480736be6ebae166e6341e0d181da34fdfbbb08610b0
SHA5128ce01f0c46f9365cbbc97813b8c9ef415b8936f5df41fe168dd9925b9779687994c67c1ef2bac4518be28926828bc3d9eda9226484bcb503b9c8ffb07470b947
-
Filesize
765B
MD5b434c1d79a26ca2142e2c27ed1531bae
SHA15d13c95762b432db1c87bb95776601678ee8e909
SHA25619f543dd1dad365e3e6be1431c7cd7f416bcf9e8aaa57f4ed9a4ce7d6fe80cd9
SHA512658ee72e163da7295ce17625ac6e9cba1110afdbad2aa9456a946d01ecc97b9c8d77c0b4338ddb558151071174adbad6a975d754ff712cfb7925cbf46a8ad5de
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34